Vulnerability Name:

CVE-2020-8315 (CCN-175392)

Assigned:2020-01-21
Published:2020-01-21
Updated:2021-07-21
Summary:In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system's copy. Windows 8 and later are unaffected.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)
4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2020-8315

Source: CCN
Type: Python Issue39401
[CVE-2020-8315] Unsafe dll loading in getpathp.c on Win7

Source: MISC
Type: Issue Tracking, Patch, Vendor Advisory
https://bugs.python.org/issue39401

Source: XF
Type: UNKNOWN
python-cve20208315-code-exec(175392)

Source: CCN
Type: IBM Security Bulletin 6491661 (Cognos Analytics)
IBM Cognos Analytics with Watson 11.2.1 has addressed multiple vulnerabilities

Source: CCN
Type: Python Web site
Python

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2020-8315

Vulnerable Configuration:Configuration 1:
  • cpe:/a:python:python:*:*:*:*:*:*:*:* (Version >= 3.6.0 and <= 3.6.10)
  • OR cpe:/a:python:python:*:*:*:*:*:*:*:* (Version >= 3.7.0 and <= 3.7.6)
  • OR cpe:/a:python:python:*:*:*:*:*:*:*:* (Version >= 3.8.0 and <= 3.8.1)

  • Configuration CCN 1:
  • cpe:/a:python:python:3.7:*:*:*:*:*:*:*
  • OR cpe:/a:python:python:3.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:python:python:3.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:python:python:3.7.6:*:*:*:*:*:*:*
  • OR cpe:/a:python:python:3.6.10:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.bionic:def:202083150000000
    V
    CVE-2020-8315 on Ubuntu 18.04 LTS (bionic) - low.
    2020-01-28
    BACK
    python python *
    python python *
    python python *
    python python 3.7
    python python 3.6.0 -
    python python 3.8.1
    python python 3.7.6
    python python 3.6.10
    ibm cognos analytics 11.2.0
    ibm cognos analytics 11.1.7